Kuliah Pengaman Jaringan Pertemuan #14 Firewall Kuliah Pengaman Jaringan
Elemen Dari Keamanan Jaringan INTEGRITY Condition existing when data is unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed. AVAILABILITY Timely, reliable access to data and information services for authorized users. Integrity Availability INFORMATION NON-REPUDIATION Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of origin, so neither can later deny having processed the data. Non-repudiation Authentication AUTHENTICATION Security measure designed to establish the validity of a transmission, message, user, or system or a means of verifying an individual's authorization to receive specific categories of information. Confidentiality CONFIDENTIALITY Assurance that information is not disclosed to unauthorized persons, processes, or devices.
Firewalls Internet Rule Base on Firewall Allow internal employees to access the Internet Hacker attempting LAN access No access from Internet to internal server Internet Firewall Internal Network Firewall – pintu keamanan elektronik yang mengecek data traffic dan menolak (yang melanggar aturan) data dari dua sisi Firewall melindungi jaringan dan data dari hackers Firewall disusun berdasarkan satu rule-base yang mengatur bentuk pesan yang diijinkan untuk keluar-masuk jaringan.
Firewalls Bekerja pada Network Layer dan atasnya Internet Firewall Private Network Physical Data Link Transport Session Presentation Application Firewall
DeMilitarized Zones (DMZ) Rule Base on the Firewall Allow SMTP from LAN Hacker denied Email server access Reject SMTP from Internet Firewall Employee Connecting to Company Email Authenticate from Internet Internet Allow SMTP from Internet Internal Network Authentication Server DMZ Email Server DeMilitarized Zone (DMZ) – adalah firewall yang bekerja pada sub-network that mengijinkan akses terbatas pada server dan jaringan Mampu melindungi server internal dan membatasi akses dari internet kedalam jaringan internal dan server.
The DMZ (Screened Subnet) Internet Screening Router Bastion Host DMZ Inside Network External Network The DMZ Inside Public Information Web Server FTP Server Private Databases Propriatary Info
Firewall Rule Base Contoh dari Check Point FireWall-1 Rule Base dengan menggunakan encryption
Gambaran Content Security: URL Screening Web Surfer Corporate Network Denied Hello! ISP ISP www.fedex.com Internet ISP ISP ISP ISP www.xxx.com
Gambaran Content Security Recipient Corporate Network ISP ISP Internet ISP ISP Anti-Virus Server & Email Server ISP ISP Sender
Intrusion Detection Teknologi yang memonitor jaringan dan menyediakan feedback tentang status dari pertahanan, mengenali attacks dan miuse dan merespon dengan rekonfigurasi dan countermeasures.
Gambaran Intrusion Detection Corporate Network Attack! Alert Intrusion Detection Server Intrusion Detection Server Intrusion Detection Server Block Hacker IP Address ISP ISP Internet ISP ISP Web Server Pool ISP ISP Hacker
Content Filters Dapat berada pada host atau network Based Melakukan scanning pada isi dari traffic yang berasal dari dalam jaringan data atau yang akan memasuki jaringan atau host. Virus protection untuk mendeteksi virus dan Trojans, sebelum mereka memasuki jaringan internal. Malicious code protection untuk mendeteksi script Visual Basic, Java dan Active X sebelum mencapai browser dan dieksekusi Email filtering untuk mengontrol spam, berkas attachment yang terlalu besar atau bocornya rahasia perusahaan. Web filtering untuk menghalangi akses ke URL yang sepantasnya Web bandwidth management memonitor Internet Traffic dan melacak surfing/download patterns.
Security In Depth through Perimeters of Defense Outer Perimeter Packet Filter Network IDS 2nd Perimeter Stateful Filter 3rd Perimeter Content Filter 4th Perimeter VLAN/VPN Final Defense Host Based IDS Host Firewall OS Hardening Security In Depth through Perimeters of Defense
10 Kesalahan yang sering dilakukan Connecting systems to the Internet before hardening them. Connecting test systems to the Internet with default accounts/passwords Failing to update systems when security holes are found. Using telnet and other unencrypted protocols for managing systems, routers, firewalls, and PKI.
10 Worst Security Mistakes IT Professional Make (cont) Giving users passwords over the phone or changing user passwords in response to telephone or personal requests when the requester is not authenticated. Failing to maintain and test backups. Running unnecessary services, especially ftpd, telnetd, finger, rpc, mail, rservices Implementing firewalls with rules that don't stop malicious or dangerous traffic-incoming or outgoing.
10 Worst Security Mistakes IT Professional Make (cont) Failing to implement or update virus detection software Failing to educate users on what to look for and what to do when they see a potential security problem. And a bonus, number 11: Allowing untrained, uncertified people to take responsibility for securing important systems.